2021
DOI: 10.1007/978-3-030-68773-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Persistent Fault Analysis with Few Encryptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Then, using the techniques of [15,18] we further refine this inequality for finite support distributions allowing us to increase the multiplicative constant depending on the smallest probability p n . Finally, then, we apply our results in the context of side-channel attacks, where guessing entropy is a key metric [20][21][22], showing that our results provide an improvement (tighter bounds) over the method of Choudary and Popescu [12], which is known as the most scalable full-key security evaluation method to date.…”
Section: Preliminariesmentioning
confidence: 84%
“…Then, using the techniques of [15,18] we further refine this inequality for finite support distributions allowing us to increase the multiplicative constant depending on the smallest probability p n . Finally, then, we apply our results in the context of side-channel attacks, where guessing entropy is a key metric [20][21][22], showing that our results provide an improvement (tighter bounds) over the method of Choudary and Popescu [12], which is known as the most scalable full-key security evaluation method to date.…”
Section: Preliminariesmentioning
confidence: 84%
“…Gruber et al applied the PFA to authenticated encryption schemes such as Deoxys-II, OCB, and COLM [GPT19]. In [CGR20], the authors meliorated the PFA by using several steps such as estimation theory, rank, and key combination algorithms. Very recently, Xu et al proposed Enhanced PFA (EPFA) [XZY + 21] which is more a key recovery approach in the single fault model.…”
Section: Related Workmentioning
confidence: 99%
“…The current common analysis methods for persistent fault [ 12 , 13 ] are mainly classical persistent fault analysis (PFA) [ 14 , 15 ], enhanced persistent fault analysis (EPFA) [ 16 ], and persistent fault-Based collision analysis (PFCA) [ 17 ]. For the SKINNY block cipher, classical persistent fault analysis cannot recovery the master key.…”
Section: Introductionmentioning
confidence: 99%